Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Physical layer security for real-world applications: use cases, results and open challenges

Physical layer security for real-world applications: use cases, results and open challenges

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Communications with Physical Layer Security for 5G and Beyond — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Physical layer security may play an important role for establishing security in future communication systems in a plug-and-play manner. This particularly holds for the IoT, where special constraints, such as the sheer number of things to be securely inter-connected or the resource-constrained nature of many devices, make it hard to directly make use of existing approaches.

Chapter Contents:

  • 17.1 Introduction
  • 17.1.1 Why physical layer security?
  • 17.1.2 Flavours of physical layer security
  • 17.1.3 Use cases and major requirements
  • 17.1.4 Comparison to alternative key establishment schemes
  • 17.2 Fundamentals
  • 17.2.1 Information-theoretic foundation
  • 17.2.2 General system architecture
  • 17.2.3 Major metrics for performance evaluation
  • 17.3 Channel-based key generation in practice
  • 17.3.1 Channel characterization
  • 17.3.1.1 Wireless channel model
  • 17.3.1.2 RSSI versus CSI
  • 17.3.1.3 Practical channel model and implications
  • 17.3.2 Pre-processing
  • 17.3.3 Quantization
  • 17.3.4 Information reconciliation
  • 17.3.5 Entropy estimation
  • 17.3.6 Privacy amplification and key verification
  • 17.3.7 Security considerations and energy consumption of CBKG
  • 17.4 Experimental results
  • 17.4.1 CSI-based experiments
  • 17.4.2 RSSI-based experiments
  • 17.5 Further aspects
  • 17.5.1 Missing building blocks
  • 17.5.2 Sensor-assisted authentication
  • 17.5.3 Physical layer security for wireline systems
  • 17.6 Summary and outlook
  • References

Inspec keywords: telecommunication security; Internet of Things

Other keywords: IoT; Internet of Things; physical layer security

Subjects: Computer communications; Data security; Computer networks and techniques

Preview this chapter:
Zoom in
Zoomout

Physical layer security for real-world applications: use cases, results and open challenges, Page 1 of 2

| /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch17-1.gif /docserver/preview/fulltext/books/te/pbte076e/PBTE076E_ch17-2.gif

Related content

content/books/10.1049/pbte076e_ch17
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address